Search
  • hisec endpoint banner pc en

    HiSec Endpoint

    HiSec Endpoint Stands Out with Unique One-Click Recovery from Ransomware, Ensuring Robust Security with Lightweight EDR Agent.

Overview

  • Overview
  • Features
  • Specifications
  • Resources
0049 intelligent traffic scheduling

Efficient detection of unknown threats

Innovative endpoint-side threat source tracing graph engine + dynamic behavior analysis, achieving > 90% unknown threat detection accuracy.

Open Edge Computing

Endpoint ransomware prevention, zero data loss

Event-triggered backup: kernel-level real-time awareness of file exceptions and file backup, enabling one-click handling and rollback of ransomware events.

easy to deploy1

Lightweight deployment, zero lag on endpoints

Lightweight agent, < 4% CPU usage, < 200 MB memory usage, < 20 MB reported data per agent per day, with no impact on user experience.

Specifications

Specifications HiSec Endpoint
Endpoint Identification and Management Automatic endpoint identification: provides automatic endpoint asset inventory capabilities. Endpoints can be automatically identified after having EDR Agent installed.
Asset information management: automatically and centrally manages endpoint asset information such as the host list, processes, ports, and components.
Endpoint security management: intelligently analyzes endpoint security and displays endpoint asset security analysis scores and risk overview.
Threat Detection and Handling Intrusion detection: offers endpoint behavior detection capabilities based on the behavior detection engine to detect malicious behaviors such as brute-force attacks, abnormal login, and privilege escalation.
Event aggregation: aggregates discrete ransomware-related alarm events into ransomware events based on the process call chain and supports one-click handling.
Virus Disposal Virus scan: uses Huawei's third-generation antivirus engine to update the antivirus signature database daily, update critical viruses in real time, and offer high-quality infected file detection capabilities.
Threat analysis: supports threat analysis on detected infected files and displays detailed threat information, such as virus identifiers, risk values, and confidence levels.
Proactive Defense Bait capture: places bait files based on ransomware signatures to detect and report abnormal behaviors in real time.
File anti-tampering: performs access permission control and real-time detection on key files to detect tampering in a timely manner.
Real-time protection: scans all directories in real time, identifies malware files in a timely manner, and blocks their transmission.
Traceability Analysis Forensic analysis: collects and stores endpoint information, and performs forensic analysis on threat events through data mining and correlation analysis.
Attack visualization: The EDR digital modeling and source tracing inference algorithm are used to visualize attacks and accurately restore attack chains.
Ransomware Encrypted File One-click Recovery Event-triggered backup: Kernel-level real-time awareness of file exceptions and file backup enable one-click handling and rollback of ransomware events.

Resources

TOP